Splunk Enterprise

Problem with filtering in props and transforms files

AdrianV1_2
Loves-to-Learn

Good afternoon.

When filtering events before indexing there is something wrong, because for unknown reasons this filter is not being applied correctly and events are still being sent which should be discarded. The configuration I have in the props and transforms files is the following (this filter has been applied both locally, and in the default and local folders of the corresponding app)

 

[props]

[traffic] (This would be the sourcetype through which these events pass.)
TRANSFORMS-null= filter_to_null

 

[transforms]

[filter_to_null]
REGEX = (?:6|7)\.company.com\.es\s\d(?:[^,]*,){25}(?!53|389|3389|445|20|21|22|23|80|8443|8080|443)
DEST_KEY = queue
FORMAT = nullQueue

 

I have seen different forums but I can't find the problem and in principle the regex does work as it has been tested on different sites and on splunk itself.

Labels (2)
0 Karma

somesoni2
Revered Legend

Are you deploying these filter configurations to your Heavy forwarders/indexers (whichever is the Splunk Enterprise/Cloud instance that comes first in the data flow)? (and restarted Splunk)

0 Karma

AdrianV1_2
Loves-to-Learn

Yes, I am applying these settings on the HF with your subsequent splunk service restart.

0 Karma
Get Updates on the Splunk Community!

Fall Into Learning with New Splunk Education Courses

Every month, Splunk Education releases new courses to help you branch out, strengthen your data science roots, ...

Super Optimize your Splunk Stats Searches: Unlocking the Power of tstats, TERM, and ...

By Martin Hettervik, Senior Consultant and Team Leader at Accelerate at Iver, Splunk MVPThe stats command is ...

How Splunk Observability Cloud Prevented a Major Payment Crisis in Minutes

Your bank's payment processing system is humming along during a busy afternoon, handling millions in hourly ...